-
1
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
M. Yung (Ed.), Advances in Cryptography - Crypto'02 Springer, Berlin
-
J. Algesheimer, J. Camenisch, V. Shoup, Efficient computation modulo a shared secret with application to the generation of shared safe-prime products, in: M. Yung (Ed.), Advances in Cryptography - Crypto'02, Lecture Notes in Computer Science, vol. 2442, Springer, Berlin, 2002, pp. 417-432.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 417-432
-
-
Algesheimer, J.1
Camenisch, J.2
Shoup, V.3
-
2
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
M. Bellare (Ed.), Advances in Cryptography - Crypto'00 Springer, Berlin
-
G. Ateniese, J. Camenisch, M. Joye, G. Tsudik, A practical and provably secure coalition-resistant group signature scheme, in: M. Bellare (Ed.), Advances in Cryptography - Crypto'00, Lecture Notes in Computer Science, vol. 1880, Springer, Berlin, 2000, pp. 11-15.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 11-15
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
3
-
-
84957043547
-
Quasi-efficient revocation of group signatures
-
M. Blaze (Ed.), FC'02 Springer, Berlin
-
G. Ateniese, D. Song, G. Tsudik, Quasi-efficient revocation of group signatures, in: M. Blaze (Ed.), FC'02, Lecture Notes in Computer Science, vol. 2357, Springer, Berlin, 2003, pp. 183-197.
-
(2003)
Lecture Notes in Computer Science
, vol.2357
, pp. 183-197
-
-
Ateniese, G.1
Song, D.2
Tsudik, G.3
-
4
-
-
84957360970
-
Collision-free accumulators and fail-stop signature schemes without trees
-
W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97 Springer, Berlin
-
N. Barić, B. Pfitzmann, Collision-free accumulators and fail-stop signature schemes without trees, in: W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97, Lecture Notes in Computer Science, vol. 1233, Springer, Berlin, 1997, pp. 480-484.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 480-484
-
-
Barić, N.1
Pfitzmann, B.2
-
5
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
E. Biham (Ed.), Advances in Cryptography - Eurocrypt'03 Springer, Berlin
-
M. Bellare, D. Micciancio, B. Warinschi, Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions, in: E. Biham (Ed.), Advances in Cryptography - Eurocrypt'03, Lecture Notes in Computer Science, vol. 2656, Springer, Berlin, 2003, pp. 614-629.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
6
-
-
37849017252
-
Foundations of group signatures: The case of dynamic groups
-
IACR's ePrint Archive
-
M. Bellare, H. Shi, C. Zhang, Foundations of group signatures: the case of dynamic groups, Technical Report 77, IACR's ePrint Archive, 2004.
-
(2004)
Technical Report
, vol.77
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
7
-
-
29244443286
-
On the soundness of Girault's scheme
-
Poster paper Rump Session
-
F. Boudot, On the soundness of Girault's scheme, Poster paper of Eurocrypt 2000, Rump Session, 2000.
-
(2000)
Eurocrypt 2000
-
-
Boudot, F.1
-
8
-
-
84958664495
-
Efficient publicly verifiable secret sharing schemes with fast or delayed recovery
-
V. Varadharajan, Y. Mu (Eds.), ICICS'99 Springer, Berlin
-
F. Boudot, J. Traoré, Efficient publicly verifiable secret sharing schemes with fast or delayed recovery, in: V. Varadharajan, Y. Mu (Eds.), ICICS'99, Lecture Notes in Computer Science, vol. 1726, Springer, Berlin, 1999, pp. 87-102.
-
(1999)
Lecture Notes in Computer Science
, vol.1726
, pp. 87-102
-
-
Boudot, F.1
Traoré, J.2
-
9
-
-
84937429196
-
Efficient revocation in group signatures
-
K. Kim (Ed.), PKC'01 Springer, Berlin
-
E. Bresson, J. Stern, Efficient revocation in group signatures, in: K. Kim (Ed.), PKC'01, Lecture Notes in Computer Science, vol. 1992, Springer, Berlin, 2001, pp. 190-206.
-
(2001)
Lecture Notes in Computer Science
, vol.1992
, pp. 190-206
-
-
Bresson, E.1
Stern, J.2
-
10
-
-
14844295011
-
Direct anonymous attestation
-
ACM Press, New York
-
E. Brickell, J. Camenisch, L. Chen, Direct anonymous attestation, in: Proceedings of 11th ACM Conference on Computer and Communications Security, ACM Press, New York, 2004.
-
(2004)
Proceedings of 11th ACM Conference on Computer and Communications Security
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
11
-
-
84957354154
-
Efficient and generalized group signatures
-
W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97 Springer, Berlin
-
J. Camenisch, Efficient and generalized group signatures, in: W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97, Lecture Notes in Computer Science, vol. 1233, Springer, Berlin, 1997, pp. 465-479.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 465-479
-
-
Camenisch, J.1
-
13
-
-
29244475923
-
-
Private communication
-
J. Camenisch, Private communication, 2000.
-
(2000)
-
-
Camenisch, J.1
-
15
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
M. Yung (Ed.), Advances in Cryptography - Crypto'02 Springer, Berlin
-
J. Camenisch, A. Lysyanskaya, Dynamic accumulators and application to efficient revocation of anonymous credentials, in: M. Yung (Ed.), Advances in Cryptography - Crypto'02, Lecture Notes in Computer Science, vol. 2442, Springer, Berlin, 2002, pp. 93-118.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
16
-
-
63449102764
-
On fair e-cash systems based on group signature schemes
-
R. Safavi-Naini, J. Seberry (Eds.), ACISP'03 Springer, Berlin
-
S. Canard, J. Traoré, On fair e-cash systems based on group signature schemes, in: R. Safavi-Naini, J. Seberry (Eds.), ACISP'03, Lecture Notes in Computer Science, vol. 2727, Springer, Berlin, 2003, pp. 237-248.
-
(2003)
Lecture Notes in Computer Science
, vol.2727
, pp. 237-248
-
-
Canard, S.1
Traoré, J.2
-
17
-
-
85001025766
-
Wallet databases with observers
-
E. Brickell (Ed.), Advances in Cryptography - Crypto'92 Springer, Berlin
-
D. Chaum, T. Pedersen, Wallet databases with observers, in: E. Brickell (Ed.), Advances in Cryptography - Crypto'92, Lecture Notes in Computer Science, vol. 740, Springer, Berlin, 1993, pp. 89-105.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.2
-
18
-
-
85024290278
-
Group signatures
-
D.W. Davies (Ed.), Advances in Cryptography - Eurocrypt'91 Springer, Berlin
-
D. Chaum, E. van Heyst, Group signatures, in: D.W. Davies (Ed.), Advances in Cryptography - Eurocrypt'91, Lecture Notes in Computer Science, vol. 547, Springer, Berlin, 1991, pp. 257-265.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
19
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Y. Desmedt (Ed.), Advances in Cryptography - Crypto'94 Springer, Berlin
-
R. Cramer, I. Damgård, B. Schoenmakers, Proofs of partial knowledge and simplified design of witness hiding protocols, in: Y. Desmedt (Ed.), Advances in Cryptography - Crypto'94, Lecture Notes in Computer Science, vol. 839, Springer, Berlin, 1994, pp. 174-187.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
20
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97 Springer, Berlin
-
R. Cramer, R. Gennaro, B. Schoenmakers, A secure and optimally efficient multi-authority election scheme, in: W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97, Lecture Notes in Computer Science, vol. 1233, Springer, Berlin, 1997, pp. 103-118.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
21
-
-
35048854233
-
Anonymous identification in ad hoc groups
-
C. Cachin, J. Camenisch (Eds.), Advances in Cryptography - Eurocrypt'04 Springer, Berlin
-
Y. Dodis, A. Kiayias, A. Nicolosi, V. Shoup, Anonymous identification in ad hoc groups, in: C. Cachin, J. Camenisch (Eds.), Advances in Cryptography - Eurocrypt'04, Lecture Notes in Computer Science, vol. 3027, Springer, Berlin, 2004, pp. 609-626.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
22
-
-
35048841283
-
Traceable signatures
-
C. Cachin, J. Camenisch (Eds.), Advances in Cryptography - Eurocrypt'04 Springer, Berlin
-
A. Kiayias, Y. Tsiounis, M. Yung, Traceable signatures, in: C. Cachin, J. Camenisch (Eds.), Advances in Cryptography - Eurocrypt'04, Lecture Notes in Computer Science, vol. 3027, Springer, Berlin, 2004, pp. 571-589.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
23
-
-
29244453439
-
Group signatures: Provable security, efficient constructions and anonymity from trapdoor holders
-
IACR's ePrint Archive
-
A. Kiayias, M. Yung, Group signatures: provable security, efficient constructions and anonymity from trapdoor holders, Technical Report 76, IACR's ePrint Archive, 2004.
-
(2004)
Technical Report
, vol.76
-
-
Kiayias, A.1
Yung, M.2
-
24
-
-
84959043878
-
Efficient and secure member deletion in group signature schemes
-
D. Won (Ed.), ICISC'00 Springer, Berlin
-
H. Kim, J. Lim, D. Lee, Efficient and secure member deletion in group signature schemes, in: D. Won (Ed.), ICISC'00, Lecture Notes in Computer Science, vol. 2015, Springer, Berlin, 2000, pp. 150-161.
-
(2000)
Lecture Notes in Computer Science
, vol.2015
, pp. 150-161
-
-
Kim, H.1
Lim, J.2
Lee, D.3
-
25
-
-
84946820591
-
Unbelievable security: Matching AES security using public key systems
-
C. Boyd (Ed.), Advances in Cryptography - Asiacrypt'01 Springer, Berlin
-
A.K. Lenstra, Unbelievable security: matching AES security using public key systems, in: C. Boyd (Ed.), Advances in Cryptography - Asiacrypt'01, Lecture Notes in Computer Science, vol. 2248, Springer, Berlin, 2001, pp. 67-86.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 67-86
-
-
Lenstra, A.K.1
-
26
-
-
84946833891
-
How to leak a secret
-
C. Boyd (Ed.), Advances in Cryptography - Asiacrypt'01 Springer, Berlin
-
R.L. Rivest, A. Shamir, Y. Tauman, How to leak a secret, in: C. Boyd (Ed.), Advances in Cryptography - Asiacrypt'01, Lecture Notes in Computer Science, vol. 2248, Springer, Berlin, 2001, pp. 552-565.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
27
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr Efficient signature generation by smart cards J. Cryptol. 4 1991 161 174
-
(1991)
J. Cryptol.
, vol.4
, pp. 161-174
-
-
Schnorr, C.1
-
28
-
-
29244440605
-
-
Master's Thesis, Technische Universiteit Eindhoven, June
-
M. Stam, Toggling schemes for electronic voting, Master's Thesis, Technische Universiteit Eindhoven, June 1999.
-
(1999)
Toggling Schemes for Electronic Voting
-
-
Stam, M.1
-
29
-
-
84961331891
-
Group signatures and their relevance to privacy-protecting off-line electronic cash systems
-
ACISP'99 Springer, Berlin
-
J. Traoré, Group signatures and their relevance to privacy-protecting off-line electronic cash systems, ACISP'99, Lecture Notes in Computer Science, vol. 1587, Springer, Berlin, 1999, pp. 228-243.
-
(1999)
Lecture Notes in Computer Science
, vol.1587
, pp. 228-243
-
-
Traoré, J.1
|